Description
|
|
Multiple vulnerabilities have been identified in Joomla!, which could be exploited by remote attackers to execute arbitrary SQL commands or gain knowledge of sensitive information.
The first issue is due to unspecified input validation errors in the administrative interface that does not properly validate certain parameters before being used in SQL statements, which could be exploited by malicious people to conduct SQL injection attacks.
The second flaw is due to errors in the "syndication" module and "mod_templatechooser", which could be exploited by attackers to determine the installation path.
The third vulnerability is due access validation errors in various sections, which could be exploited by attackers to bypass security restrictions and gain unauthorized access to protected contents.
|